Browse Definitions :
39 results for:

whitelisting

whitelist

Definition | WhatIs.com

A whitelist is a list of e-mail addresses or domain names from which an e-mail blocking program will allow messages to be received.

application whitelisting

Definition | SearchSecurity

Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all other applications ...

behavior whitelisting

Definition | WhatIs.com

Behavior whitelisting is a security method in which permissable actions within a given system are specified and all others are blocked.

Microsoft Windows Defender Device Guard

Definition | SearchEnterpriseDesktop

Windows Defender Device Guard is a security feature for Windows 10 Enterprise and Windows Server 2016 designed to use application whitelisting and ...

SmartScreen

Definition | WhatIs.com

SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks ...

application blacklisting

Definition | SearchSecurity

Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of ...

behavior blacklisting

Definition | WhatIs.com

Behavior blacklisting is a security method based on detecting specified suspicious actions on the part of software or human agents and blocking ...

greylist (or graylist)

Definition | WhatIs.com

A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam. If a message ...

Samsung KNOX

Definition | SearchMobileComputing

Samsung KNOX is a set of enterprise mobility management services that offers mobile device and data protection and management. KNOX is available in ...

VoIP caller ID (Voice over Internet Protocol caller identification)

Definition | SearchUnifiedCommunications

VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

  • incident response team

    An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

Close